Please turn on your JavaScript for this page to function normally.
building blocks
Migrations represent the number one challenge for database professionals

Migrations are now the number one priority for database professionals, a new Redgate report reveals. Cloud usage is on the up, for example, with 44% of organizations now using …

connection
To benefit from DevOps implementation, security and dev teams must communicate better

Despite the enterprise benefits assured by adopting a DevOps culture, the majority of IT leaders believe communication between IT security and software development must …

circle
Disaster recovery readiness is essential for hybrid and multi-cloud strategies

Disaster recovery capability is a key factor in implementing hybrid and multi-cloud strategy, a new Teradici study reveals. Of the respondents who had implemented a hybrid or …

Wandera
Protect privacy and provide secure mobile access to corporate data

In this Help Net Security podcast, Mike Campin, VP of Engineering at Wandera, talks about how their solution solves a problem that every business is facing today, which is how …

password
The art and science of password hashing

The recent FlipBoard breach shines a spotlight again on password security and the need for organizations to be more vigilant. Password storage is a critical area where …

cloud
Eliminating fragmentation unlocks opportunities to realize the promise of the cloud

A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 …

traffic
To remain competitive, businesses need strategic digital transformation

With no international alignment on how to regulate the digital environment, companies are managing an increasingly complicated set of conflicting rules in key markets. At the …

hospital
How the healthcare industry can improve online trust

Privacy on the internet is important in all industries, but none more so than the healthcare sector, which handles mass amounts of online health data daily. While any data …

up
Priorities IT pros follow to ensure ingrained privacy and compliance

Products that help businesses discover and map data flows top the list of purchase plans and the privacy team is playing a larger role in privacy tech purchasing decisions as …

cloud
What is and what is not working for security operations teams in securing cloud data

Security professionals continue to face a number of major challenges as more organizations move legacy IT operations to cloud infrastructure and applications, and traditional …

money
Annual spend on Mobile Edge Computing will reach $11.2 billion by 2024

Total annual spend on Mobile Edge Computing (the collection and analysis of data at the source of generation, at the Edge of the network, instead of a centralised location …

facepalm
Week in review: Vaccinating algorithms against attacks, cybersecurity pros burning out

Here’s an overview of some of last week’s most interesting news, articles and reviews: Anatomy of a ransomware attack: How attackers gain access to unstructured …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools